Master

In a 24/7, always-on, digital world, securing your systems and data is more important than ever. Find out more about some of the hottest topics in security.

Automated compliance

A new approach to compliance testing

Read more

Biometrics

Biometrics

Read more

Business continuity
planning

The execution of a predetermined plan to keep your IT systems on their feet after an event compromises the core systems.

Read more

Compliance as code

Data or information privacy is the practice of protecting data through its life wherever it lives or wherever it is sent, to assure the owner of that data that only permitted actors can access it.

Read more

Data privacy

Data or information privacy is the practice of protecting data through its life wherever it lives or wherever it is sent, to assure the owner of that data that only permitted actors can access it.

Read more

Decentralized identity

Decentralized identity is a concept that puts individuals in control of their personal information, who it is shared with and who can access it.

Read more

Decentralized security

Decentralized security makes information security everyone’s responsibility

Read more

DevSecOps

DevSecOps is a term coined to integrate security practices inside the development environment and operations collaborations that we know as DevOps.

Read more

Disaster recovery

The execution of a predetermined plan and infrastructure to get your IT systems back from the brink after an event compromises the core systems.

Read more

Homomorphic
encryption

An encryption method that allows a user to carry out defined operations on a set of encrypted data without ever getting the opportunity to decrypt any parts.

Read more

IAST/RASP

Data or information privacy is the practice of protecting data through its life wherever it lives or wherever it is sent, to assure the owner of that data that only permitted actors can access it.

Read more

Incident response

Data or information privacy is the practice of protecting data through its life wherever it lives or wherever it is sent, to assure the owner of that data that only permitted actors can access it.

Read more

IoT security

Data or information privacy is the practice of protecting data through its life wherever it lives or wherever it is sent, to assure the owner of that data that only permitted actors can access it.

Read more

Passwordless
authentication

Data or information privacy is the practice of protecting data through its life wherever it lives or wherever it is sent, to assure the owner of that data that only permitted actors can access it.

Read more

Pen testing

Penetration testing, or pen testing, is the practice of deliberately trying to break into a system from the outside to expose its vulnerabilities.

Read more

Privacy by Design

Privacy by Design

Read more

Privacy-aware
communication

Privacy-aware communication

Read more

Red, blue, and
purple teams

Data or information privacy is the practice of protecting data through its life wherever it lives or wherever it is sent, to assure the owner of that data that only permitted actors can access it.

Read more

Security policy
as code

Data or information privacy is the practice of protecting data through its life wherever it lives or wherever it is sent, to assure the owner of that data that only permitted actors can access it.

Read more

Security-forward business

Security-forward businesses embed data security into every aspect of their operations.

Read more

Threat modeling

Data or information privacy is the practice of protecting data through its life wherever it lives or wherever it is sent, to assure the owner of that data that only permitted actors can access it.

Read more

Zero-trust architecture

Zero trust is a security concept where access to systems — both internally and externally — should demand authentication.

Read more

Would you like to suggest a topic to be decoded?

Just leave your email address and we'll be in touch the moment it's ready.